期刊文献+

安全组播密钥管理的研究

Study of Security Multicast Management of Key
下载PDF
导出
摘要 缺乏安全机制限制了组播在各种网络业务中的应用.组播密钥管理通过为组播成员生成、发送和更新组密钥来满足加密认证等安全需求.组播密钥管理方案的设计,除了要满足基本的安全需求,还要兼顾可扩展性、健壮性、可靠性等多方面因素.分析了组播密钥管理所面临的问题,并通过对已有的几种组播密钥树方案的介绍,探讨和总结了组播密钥管理的研究现状和发展趋势. The absence of security mechanism has limited the use of multicast. Key management for multicast is used for group members in one multicast session to generate, refresh and transfer keys which are used for encryption and authentication. In addition to the maintenance of keys, issues about scalability, reliability and robustness should be carefully considered. In this paper, the existing problems in key management for multicast are analyzed, and some typical schemes are reviewed.
作者 史宏杰
机构地区 浙江万里学院
出处 《浙江万里学院学报》 2005年第4期28-31,共4页 Journal of Zhejiang Wanli University
关键词 组播安全 密钥分发管理 密钥更新 猫映射 multicast security management of key distribution re-key cat map
  • 相关文献

参考文献4

二级参考文献16

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献136

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部